Twinge attack (original) (raw)
In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away.
Property | Value |
---|---|
dbo:abstract | In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away. As long as the computer is safely behind a router or a firewall, there is nothing to worry about with this attack. With this attack, the adversary intends to prevent the system from operating normally, i.e. a denial of service. Configuring upstream network devices (including firewalls and routers) to ignore ICMP packets from the public Internet will make this almost certainly not succeed. (en) |
dbo:wikiPageID | 8970838 (xsd:integer) |
dbo:wikiPageLength | 1896 (xsd:nonNegativeInteger) |
dbo:wikiPageRevisionID | 1082906990 (xsd:integer) |
dbo:wikiPageWikiLink | dbr:Router_(computing) dbr:Internet_Control_Message_Protocol dbr:Spoofing_attack dbc:Denial-of-service_attacks dbr:Firewall_(computing) |
dbp:date | September 2018 (en) |
dbp:reason | Does the signature give away the identity of the program or the attacker? (en) |
dbp:wikiPageUsesTemplate | dbt:Clarify dbt:Internet-stub dbt:Reflist dbt:Short_description dbt:Computer-security-stub |
dcterms:subject | dbc:Denial-of-service_attacks |
rdf:type | yago:Abstraction100002137 yago:Act100030358 yago:Activity100407535 yago:Attack100972621 yago:Event100029378 yago:Operation100955060 yago:PsychologicalFeature100023100 yago:YagoPermanentlyLocatedEntity yago:WikicatDenial-of-serviceAttacks |
rdfs:comment | In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets. This makes identification of the source of the malicious packets difficult. The idea of the attack is to either degrade the performance of the attacked computer or make it crash. The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away. (en) |
rdfs:label | Twinge attack (en) |
owl:sameAs | freebase:Twinge attack wikidata:Twinge attack https://global.dbpedia.org/id/4wqCz yago-res:Twinge attack |
prov:wasDerivedFrom | wikipedia-en:Twinge_attack?oldid=1082906990&ns=0 |
foaf:isPrimaryTopicOf | wikipedia-en:Twinge_attack |
is dbo:wikiPageRedirects of | dbr:TWINGE |
is dbo:wikiPageWikiLink of | dbr:Ping_flood dbr:TWINGE |
is foaf:primaryTopic of | wikipedia-en:Twinge_attack |